rpm package
suse/kernel-source&distro=SUSE Manager Proxy 4.3
pkg:rpm/suse/kernel-source&distro=SUSE%20Manager%20Proxy%204.3
Vulnerabilities (1,907)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2022-48648 | — | < 5.14.21-150400.24.119.1 | 5.14.21-150400.24.119.1 | Apr 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: sfc: fix null pointer dereference in efx_hard_start_xmit Trying to get the channel from the tx_queue variable here is wrong because we can only be here if tx_queue is NULL, so we shouldn't dereference it. As th | ||
| CVE-2022-48647 | — | < 5.14.21-150400.24.119.1 | 5.14.21-150400.24.119.1 | Apr 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: sfc: fix TX channel offset when using legacy interrupts In legacy interrupt mode the tx_channel_offset was hardcoded to 1, but that's not correct if efx_sepparate_tx_channels is false. In that case, the offset | ||
| CVE-2022-48638 | — | < 5.14.21-150400.24.119.1 | 5.14.21-150400.24.119.1 | Apr 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory cgroup has to be one kernfs dir, otherwise kernel panic is caused, especially cgroup id is provide from userspace. | ||
| CVE-2022-48637 | — | < 5.14.21-150400.24.119.1 | 5.14.21-150400.24.119.1 | Apr 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: bnxt: prevent skb UAF after handing over to PTP worker When reading the timestamp is required bnxt_tx_int() hands over the ownership of the completed skb to the PTP worker. The skb should not be used afterwards | ||
| CVE-2022-48636 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | Apr 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup Fix Oops in dasd_alias_get_start_dev() function caused by the pavgroup pointer being NULL. The pavgroup pointer is checked on the entranc | ||
| CVE-2022-48634 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | Apr 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: drm/gma500: Fix BUG: sleeping function called from invalid context errors gma_crtc_page_flip() was holding the event_lock spinlock while calling crtc_funcs->mode_set_base() which takes ww_mutex. The only reaso | ||
| CVE-2022-48632 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | Apr 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction() memcpy() is called in a loop while 'operation->length' upper bound is not checked and 'data_idx' also increments. | ||
| CVE-2022-48631 | — | < 5.14.21-150400.24.119.1 | 5.14.21-150400.24.119.1 | Apr 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth > 0 When walking through an inode extents, the ext4_ext_binsearch_idx() function assumes that the extent header has been previously validated. | ||
| CVE-2024-26928 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | Apr 28, 2024 | In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_debug_files_proc_show() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF. | ||
| CVE-2024-26925 | Med | 5.5 | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | Apr 25, 2024 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path The commit mutex should not be released during the critical section between nft_gc_seq_begin() and nft_gc_seq_end(), otherwise, async GC | |
| CVE-2024-26923 | Med | 4.7 | < 5.14.21-150400.24.125.1 | 5.14.21-150400.24.125.1 | Apr 25, 2024 | In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect() Garbage collector does not take into account the risk of embryo getting enqueued during the garbage collection. If such embryo has a peer that carries SCM | |
| CVE-2024-26924 | — | < 5.14.21-150400.24.170.1 | 5.14.21-150400.24.170.1 | Apr 24, 2024 | In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: do not free live element Pablo reports a crash with large batches of elements with a back-to-back add/remove pattern. Quoting Pablo: add_elem("00000000") timeout 100 ms ... ad | ||
| CVE-2024-26921 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | Apr 18, 2024 | In the Linux kernel, the following vulnerability has been resolved: inet: inet_defrag: prevent sk release while still in use ip_local_out() and other functions can pass skb->sk as function argument. If the skb is a fragment and reassembly happens before such function call retu | ||
| CVE-2024-26903 | Med | 5.5 | < 5.14.21-150400.24.119.1 | 5.14.21-150400.24.119.1 | Apr 17, 2024 | In the Linux kernel, the following vulnerability has been resolved: Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security During our fuzz testing of the connection and disconnection process at the RFCOMM layer, we discovered this bug. By comparing the packets from a no | |
| CVE-2024-26898 | Hig | 7.8 | < 5.14.21-150400.24.119.1 | 5.14.21-150400.24.119.1 | Apr 17, 2024 | In the Linux kernel, the following vulnerability has been resolved: aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts This patch is against CVE-2023-6270. The description of cve is: A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel. | |
| CVE-2024-26852 | Hig | 7.8 | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | Apr 17, 2024 | In the Linux kernel, the following vulnerability has been resolved: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() syzbot found another use-after-free in ip6_route_mpath_notify() [1] Commit f7225172f25a ("net/ipv6: prevent use after free in ip6_route_mpath_notify") w | |
| CVE-2024-26862 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | Apr 17, 2024 | In the Linux kernel, the following vulnerability has been resolved: packet: annotate data-races around ignore_outgoing ignore_outgoing is read locklessly from dev_queue_xmit_nit() and packet_getsockopt() Add appropriate READ_ONCE()/WRITE_ONCE() annotations. syzbot reported: | ||
| CVE-2024-26840 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | Apr 17, 2024 | In the Linux kernel, the following vulnerability has been resolved: cachefiles: fix memory leak in cachefiles_add_cache() The following memory leak was reported after unbinding /dev/cachefiles: ================================================================== unreferenced obj | ||
| CVE-2024-26828 | — | < 5.14.21-150400.24.122.1 | 5.14.21-150400.24.122.1 | Apr 17, 2024 | In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through the buffer and after each item we check if the size_left is greater than the minimum size we need. However, the problem is that "b | ||
| CVE-2021-47219 | — | < 5.14.21-150400.24.119.1 | 5.14.21-150400.24.119.1 | Apr 10, 2024 | In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() The following issue was observed running syzkaller: BUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline] BUG: KASAN: slab |
- CVE-2022-48648Apr 28, 2024affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1
In the Linux kernel, the following vulnerability has been resolved: sfc: fix null pointer dereference in efx_hard_start_xmit Trying to get the channel from the tx_queue variable here is wrong because we can only be here if tx_queue is NULL, so we shouldn't dereference it. As th
- CVE-2022-48647Apr 28, 2024affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1
In the Linux kernel, the following vulnerability has been resolved: sfc: fix TX channel offset when using legacy interrupts In legacy interrupt mode the tx_channel_offset was hardcoded to 1, but that's not correct if efx_sepparate_tx_channels is false. In that case, the offset
- CVE-2022-48638Apr 28, 2024affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1
In the Linux kernel, the following vulnerability has been resolved: cgroup: cgroup_get_from_id() must check the looked-up kn is a directory cgroup has to be one kernfs dir, otherwise kernel panic is caused, especially cgroup id is provide from userspace.
- CVE-2022-48637Apr 28, 2024affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1
In the Linux kernel, the following vulnerability has been resolved: bnxt: prevent skb UAF after handing over to PTP worker When reading the timestamp is required bnxt_tx_int() hands over the ownership of the completed skb to the PTP worker. The skb should not be used afterwards
- CVE-2022-48636Apr 28, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup Fix Oops in dasd_alias_get_start_dev() function caused by the pavgroup pointer being NULL. The pavgroup pointer is checked on the entranc
- CVE-2022-48634Apr 28, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: drm/gma500: Fix BUG: sleeping function called from invalid context errors gma_crtc_page_flip() was holding the event_lock spinlock while calling crtc_funcs->mode_set_base() which takes ww_mutex. The only reaso
- CVE-2022-48632Apr 28, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction() memcpy() is called in a loop while 'operation->length' upper bound is not checked and 'data_idx' also increments.
- CVE-2022-48631Apr 28, 2024affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1
In the Linux kernel, the following vulnerability has been resolved: ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth > 0 When walking through an inode extents, the ext4_ext_binsearch_idx() function assumes that the extent header has been previously validated.
- CVE-2024-26928Apr 28, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix potential UAF in cifs_debug_files_proc_show() Skip sessions that are being teared down (status == SES_EXITING) to avoid UAF.
- affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path The commit mutex should not be released during the critical section between nft_gc_seq_begin() and nft_gc_seq_end(), otherwise, async GC
- affected < 5.14.21-150400.24.125.1fixed 5.14.21-150400.24.125.1
In the Linux kernel, the following vulnerability has been resolved: af_unix: Fix garbage collector racing against connect() Garbage collector does not take into account the risk of embryo getting enqueued during the garbage collection. If such embryo has a peer that carries SCM
- CVE-2024-26924Apr 24, 2024affected < 5.14.21-150400.24.170.1fixed 5.14.21-150400.24.170.1
In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_set_pipapo: do not free live element Pablo reports a crash with large batches of elements with a back-to-back add/remove pattern. Quoting Pablo: add_elem("00000000") timeout 100 ms ... ad
- CVE-2024-26921Apr 18, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: inet: inet_defrag: prevent sk release while still in use ip_local_out() and other functions can pass skb->sk as function argument. If the skb is a fragment and reassembly happens before such function call retu
- affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: rfcomm: Fix null-ptr-deref in rfcomm_check_security During our fuzz testing of the connection and disconnection process at the RFCOMM layer, we discovered this bug. By comparing the packets from a no
- affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1
In the Linux kernel, the following vulnerability has been resolved: aoe: fix the potential use-after-free problem in aoecmd_cfg_pkts This patch is against CVE-2023-6270. The description of cve is: A flaw was found in the ATA over Ethernet (AoE) driver in the Linux kernel.
- affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: net/ipv6: avoid possible UAF in ip6_route_mpath_notify() syzbot found another use-after-free in ip6_route_mpath_notify() [1] Commit f7225172f25a ("net/ipv6: prevent use after free in ip6_route_mpath_notify") w
- CVE-2024-26862Apr 17, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: packet: annotate data-races around ignore_outgoing ignore_outgoing is read locklessly from dev_queue_xmit_nit() and packet_getsockopt() Add appropriate READ_ONCE()/WRITE_ONCE() annotations. syzbot reported:
- CVE-2024-26840Apr 17, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: cachefiles: fix memory leak in cachefiles_add_cache() The following memory leak was reported after unbinding /dev/cachefiles: ================================================================== unreferenced obj
- CVE-2024-26828Apr 17, 2024affected < 5.14.21-150400.24.122.1fixed 5.14.21-150400.24.122.1
In the Linux kernel, the following vulnerability has been resolved: cifs: fix underflow in parse_server_interfaces() In this loop, we step through the buffer and after each item we check if the size_left is greater than the minimum size we need. However, the problem is that "b
- CVE-2021-47219Apr 10, 2024affected < 5.14.21-150400.24.119.1fixed 5.14.21-150400.24.119.1
In the Linux kernel, the following vulnerability has been resolved: scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() The following issue was observed running syzkaller: BUG: KASAN: slab-out-of-bounds in memcpy include/linux/string.h:377 [inline] BUG: KASAN: slab
Page 82 of 96